
Schemers Use Pretexting and Vishing to Gather Passwords and Sensitive Data
How difficult is it to trick someone into revealing sensitive data like passwords over phone calls, text messages, or emails? Sadly, it is easier than you might think as hackers employ phishing techniques like... Read more

3 Types of Complicated and Costly Email Threats That Organizations Should Watch Out For
It is estimated that $2.9 million is lost to cybercrime every single minute and that large companies are losing $25/minute on security breaches alone. These are shocking numbers, and it is likely that they will grow... Read more

10 Essential Security Settings in Smartphones You Should Use to Protect Yourself
When was the last time you reviewed your phone’s security settings? Do you get the impression that your mobile device is a lot safer to use than your computer? Well, cybercrime evolves just as fast as everything else... Read more

Only A Third of Data Breach Victims Change Their Passwords, New Study Finds
Constant worrying and stress do no good for the body, mind, and soul. That being said, some people might be too relaxed about the wrong things. Password security being one of them. Even when passwords are breached,... Read more

You Are Not Scammed by Real People. You Are Scammed by Bots
It seems like everyone is going through some type of fatigue that is directly or indirectly caused by the COVID-19 pandemic. That is, everyone but cybercriminals. It would be great if they were too stressed out to... Read more

If You Think 3sYqo15hiL is a Good Password, Think Again
Although security researchers are looking for ways to get rid of passwords, it does not look like that is happening any time soon. Passwords are and going to remain the core part of account security, and everyone must... Read more

Qbot's New Version Can Hijack Email Threads
The online threat landscape is a very peculiar place. It shifts and changes all the time, and we see new names come in while old ones drop out every single day. In light of all this, you might expect that a malware... Read more

5 Questions and Answers About What to Do After a Data Breach
Question 1: Did I experience a data breach? There are several types of data breaches. While some are targeted at large companies and organizations, others are conducted on a more personal level. A data breach that... Read more

Watch Out for the 'Fix Incoming Email Issues' Email Aimed at Outlook Users
Unfortunately, emails that try to trick you into giving away your login credentials have become so common, that they are now a part of our everyday online existence. Most of these campaigns are not incredibly... Read more

How to Easily Transfer Files Between Mac and Windows
Here's a task that, on the face of it at least, should be very simple. You have a Windows PC and a Mac, and you need to transfer files from one of the devices to the other. How do you go about doing it? It looks like... Read more

4 Things That Help Hackers Perform Successful Cyber Attacks
While COVID-19 has disrupted the lives of many, the chaos that the pandemic has brought created various opportunities for cybercriminals. In other words, cyber attacks are on the rise, which is why you should care... Read more

Before You Start Using Facebook's Messenger Rooms, Consider Your Account's Security
Applications with video-conferencing functionality are on the rise as many people stay at home due to the COVID-19 pandemic. Such tools allow users to work from home as well as stay connected with their friends and... Read more